Nothing Special   »   [go: up one dir, main page]

US7561044B2 - Adaptive radio frequency identification control algorithm - Google Patents

Adaptive radio frequency identification control algorithm Download PDF

Info

Publication number
US7561044B2
US7561044B2 US11/397,244 US39724406A US7561044B2 US 7561044 B2 US7561044 B2 US 7561044B2 US 39724406 A US39724406 A US 39724406A US 7561044 B2 US7561044 B2 US 7561044B2
Authority
US
United States
Prior art keywords
rfid
period
timeout setting
time period
threshold time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related, expires
Application number
US11/397,244
Other versions
US20070229260A1 (en
Inventor
John F. Braun
Jean-Hiram Coffy
Arthur J. Parkos
Michael P. Swenson
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Pitney Bowes Inc
Original Assignee
Pitney Bowes Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Pitney Bowes Inc filed Critical Pitney Bowes Inc
Priority to US11/397,244 priority Critical patent/US7561044B2/en
Assigned to PITNEY BOWES INC. reassignment PITNEY BOWES INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: PARKOS, ARTHUR J., BRAUN, JOHN F., COFFY, JEAN-HIRAM, SWENSON, MICHAEL P.
Publication of US20070229260A1 publication Critical patent/US20070229260A1/en
Application granted granted Critical
Publication of US7561044B2 publication Critical patent/US7561044B2/en
Assigned to JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT reassignment JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BORDERFREE, INC., NEWGISTICS, INC., PITNEY BOWES INC., Tacit Knowledge, Inc.
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/06Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
    • H04B7/0602Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using antenna switching
    • H04B7/0604Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using antenna switching with predefined switching scheme
    • H04B7/0606Random or pseudo-random switching scheme
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • G06Q20/203Inventory monitoring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B5/00Near-field transmission systems, e.g. inductive or capacitive transmission systems
    • H04B5/40Near-field transmission systems, e.g. inductive or capacitive transmission systems characterised by components specially adapted for near-field transmission
    • H04B5/48Transceivers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B5/00Near-field transmission systems, e.g. inductive or capacitive transmission systems
    • H04B5/70Near-field transmission systems, e.g. inductive or capacitive transmission systems specially adapted for specific purposes
    • H04B5/77Near-field transmission systems, e.g. inductive or capacitive transmission systems specially adapted for specific purposes for interrogation

Definitions

  • the present invention relates to Radio Frequency IDentification (RFID) systems and, more particularly, to a new and useful control algorithm for an RFID which optimizes the accuracy, veracity and conclusions which may be drawn from the RFID system.
  • RFID Radio Frequency IDentification
  • Radio Frequency Identification is a method of identifying unique devices, and information contained therein, using radio waves.
  • a reader communicates with a tag/device which holds unique digital information in a microchip.
  • the tag/device may employ select materials to reflect back a portion of the transmitted radio waves thereby providing an indication that the tag/device is within the field or zone of the interrogating reader.
  • a passive RFID system employs a passive tag/device having a receiving antenna which is sufficiently large, or selectively shaped/dimensioned, to capture (or harvest) energy from a surrounding electromagnetic field, i.e., the radio frequency energy, to power the passive tag/device.
  • the receiving antenna is electrically connected to a central microchip which performs various preprogrammed RFID functions.
  • An active RFID system employs an active tag/device having an energy source, e.g., an embedded battery, to power the active device and broadcast signals to the reader. Consequently, active RFID systems do not require an electromagnetic field to power the tag/device.
  • a semi-passive system is similar to active systems in the sense that an energy source is employed to power a tag/device, however, the energy is used to activate or augment the microchip's processing capability rather than to broadcast signals back to the reader.
  • the tags/device employed in semi-passive systems are also referred to as battery-assisted tags inasmuch as a portion of the energy is acquired from the tag while another portion is obtained from the read field of the antenna. As such, semi-passive tags increase the read range of the RFID system.
  • RFID systems operate in the Low, High and Ultra-High Frequency radio frequency bands or between the range of about 125 kHz (LF) to about 960 MHz (UHF).
  • LF bands 125 kHz
  • UHF bands ultra-high frequency bands
  • RFID technology is continuously improving and, currently, readers can produce a field such that a device located therein can be energized and/or interrogated at distances of up to 1000 feet (especially when using powered/active tags).
  • Readers often employ multiplexers which utilize a plurality of antennas activated serially or in seriatim. More specifically, each of the antennas interrogates a field or zone for a certain period of time to ensure that all tags, i.e., anticipated to be located within the particular read field, have had sufficient time to harvest the RF energy and report its information back to the reader. For example, a reader having eight (8) antennas each interrogating a field for a period of about ten (10) seconds (i.e., to ensure that each tag/device within a specific read field has had ample opportunity to respond/report information) will require a total of eighty (80) seconds (11 ⁇ 3 minutes) to complete one full interrogation cycle. Therefore, as the number of antennas increase to cover a larger territory, the time required to complete an interrogation cycle increases proportionally.
  • RFID systems facilitate tracking of various items (i.e., items which have an accompanying RFID tag/device) for the purpose of controlling merchandise, maintaining inventory levels, or simply monitoring the location and/or flow of important documents. Furthermore, inasmuch as RFID systems utilize time-stamping (typically measured from a common reference such as the EPOCH) to identify when a particular tag/device was identified by the reader, certain information can be ascertained and conclusions drawn from information reported.
  • time-stamping typically measured from a common reference such as the EPOCH
  • two (2) of the tagged items may incorrectly be characterized as having been stationary, i.e., remaining in the original location, for the duration of the interrogation cycle—despite the fact that these two items moved and returned before the system could properly or correctly track such movement.
  • a method for adaptively controlling a Radio Frequency IDentification (RFID) system having a plurality of interrogating antennas and RFID tags comprises the steps of establishing a timeout setting indicative of the time that each interrogating antenna powers a read field during a respective read period and a threshold time period indicative of the time required to transmit energy/exchange data between the RFID tag and the interrogating antenna.
  • RFID Radio Frequency IDentification
  • a period differential is then calculated which is indicative of the difference between the timeout setting and the time elapsed for the final RFID tag within a respective read field to communicate its RFID tag information.
  • the timeout setting for each interrogating antenna may then be adaptively tuned or varied in accordance with the period differential.
  • a variance may also be calculated indicative of the difference between the threshold time period and the period differential.
  • the timeout setting may be decremented when the threshold time period is greater than the period differential and/or variance and incremented when the time period is less than the period differential and/or variance. Such variation of the timeout setting is evaluated with each interrogation cycle of the RFID system.
  • FIG. 1 is a schematic block diagram of a Radio Frequency IDentification (RFID) system having a plurality of antennas which collaboratively establish respective read fields for interrogating the presence and/or location of RFID tags/devices.
  • RFID Radio Frequency IDentification
  • FIG. 2 is a flow diagram of a method for enhancing the performance of an RFID system by adaptively tuning the RFID system.
  • FIG. 3 a shows RFID tag information in tabular format indicative of various settings and values of an RFID system according to the present invention while the system performs an initial interrogation cycle.
  • FIG. 3 b shows the RFID tag information indicative of the settings and values of the RFID system following a subsequent interrogation cycle.
  • FIG. 3 c shows the RFID tag information and the effects of adaptive tuning on the RFID system following a third interrogation cycle and upon reaching a steady state condition.
  • the present invention is described in the context of a Radio Frequency Identification (RFID) system having a plurality of antennas communicating with a single RFID reader.
  • RFID Radio Frequency Identification
  • Each antenna produces a respective read field within an area of interest, i.e., an office space or inventory stock room, and interrogate/communicate with various RFID tags/devices which may be disposed within the respective read field.
  • the read fields produced may be circular or linear polarized (i.e., directional) antennas depending upon the configuration or region of interest, e.g., a square office area, rectangular isle, etc.
  • the read fields will generally be configured to span or provide coverage for the entire area to ensure that all RFID tags/devices within the area receive or harvest sufficient energy to communicate with the antenna/reader.
  • the RFID system is dynamically tuned to improve the energy harvested by an RFID tag/device should a tag/device be located along a fringe area or condition of a respective read field.
  • the RFID system 10 employs eight (8) RF antennas 12 each disposed within an office area 14 and produces a substantially circular read field 16 .
  • the antennas 12 are electrically connected to a central reader 18 which is capable of supplying or transmitting RF energy to the antennas in addition to receiving and processing digital information therefrom. More specifically, the reader 18 is preprogrammed to sequentially power each antenna for a specific period of time, typically referred to as the “timeout setting”.
  • the timeout setting may also be viewed as the period of time that the interrogating antenna transmits RF energy within a respective read field 16 to power, energize or activate RFID tags/devices 20 which may be located or disposed within the read field 16 .
  • the reader 18 will also include an anti-collision algorithm to prevent the various tag/devices from simultaneously transmitting feedback signals to or communicating with the reader at the same time. That is, the anti-collision algorithm causes the various tags/devices to stagger the tag feedback to prevent the signals from “colliding” or interfering with each other. Inasmuch as such anti-collision algorithms are well known in art of RFID systems, no further discussion of its operation is provided or warranted for implementing the teachings of the present invention.
  • a method for adaptively tuning the RFID system is provided to optimize the interrogation cycle within each of the respective antenna read fields.
  • a baseline or initial timeout setting is established which is indicative of the time that each interrogating antenna powers a read field during a respective read period.
  • the timeout setting will be determined based upon the number of RFID tags/devices which are anticipated to be located within a specific read field, and upon the type or “Class” of RFID tag employed in the system. With respect to the latter, RFID tags/devices are rated in various classes depending upon the type or complexity of the functions performed by the RFID tag.
  • the most elementary or fundamental RFID tag may be one which is a passive device having the sole function of reporting a serial number to an interrogating antenna.
  • RFID tags of this type require a short time period or “reporting period” to perform such function, i.e., on the order of three milliseconds (3 ms).
  • RFID tags which are more complex may include active RFID devices which may report location and identification information to the interrogating antenna. Accordingly, RFID tags of this type may require a longer reporting period, i.e., on the order of twelve milliseconds (12 ms).
  • Higher class tags may incorporate additional functionality such as cross-communication with other tags within the same or adjacent read fields. As such, even longer reporting periods or response times may be required when employing RFID tags having increased sophistication or complexity.
  • a threshold time period is established for the purpose of defining when, and by what amount or degree, the RFID system requires adaptive tuning.
  • the threshold time period may be based upon the reporting period, or the time typically necessary, to acquire the RF energy and communicate RFID tag information to the respective interrogating antenna. While the threshold time period will, at minimum, be based upon the class of RFID tag employed in a particular system, the threshold time period will generally be the product of the reporting period and a factor/coefficient or percentage of the reporting period. For example, the threshold time period may be equal to a value X equal to one-hundred and fifty percent (150%) of the reporting period. Alternatively, the value X may be an even multiple of the reporting period, e.g., twice or 200% thereof.
  • the rationale for establishing the magnitude of the threshold time period will come into greater focus when discussing the steps for adaptively tuning the timeout setting with each interrogation cycle of the RFID system.
  • step C a period differential is calculated between the timeout setting and an elapsed time for a final RFID tag within the respective read field to communicate its RFID tag information. More specifically, this method step C determines the time differential between the last RFID tag to report and the end of the timeout setting. For example, if the timeout setting of a particular antenna is set to one-hundred and twenty milliseconds (120 ms) and three (3) Class 1 RFID tags report information within an elapsed time of thirty-six milliseconds (36 ms) within a respective read field, then the period differential is the difference therebetween or eighty-four milliseconds (84 ms).
  • a variance is calculated as the difference between the period differential and the threshold time period.
  • a threshold time period may be established in step B above as being a multiple of the reporting period. If the reporting period for a class 1 RFID tag is twelve milliseconds (12 ms), then the threshold time period may be established at, for example, twice the reporting period or twenty-four milliseconds (24 ms). Using the values discussed above, the variance is calculated to be sixty milliseconds (60 ms) or twenty four milliseconds (24 ms) subtracted from eighty-four milliseconds (84 ms).
  • the timeout setting of each interrogating antenna may be adaptively varied in accordance with the respective variance. That is, with each interrogation cycle, the timeout setting for each antenna may be incremented or decremented to optimize the interrogation time of the overall RFID system. For example, should a timeout setting have been established at a substantially higher value than the elapsed time required for reporting, i.e., the reporting period, then greater efficiencies may be achieved by reducing the timeout setting during the next or subsequent interrogation cycles.
  • the timeout setting may be varied directly from information obtained from the period differential, however, for more refined tuning a comparison is made using the variance, i.e., the difference between the threshold value and the period differential. For example, it may be appropriate to decrement the timeout setting if the period differential is greater than some percentage of the timeout setting. That is, if the period differential is calculated to be fifty percent (50%) of the timeout setting, then one can conclude that the timeout setting is larger than necessary. Consequently, it may be appropriate to decrement the timeout setting by twenty-five percent (25%), or fifty percent (50%) of the period differential, during the next or subsequent interrogation cycle.
  • FIGS. 3 a - 3 c illustrate, in tabular form, the established and calculated values described in the inventive method.
  • Each of the tables comprises eight rows consistent with the total number of interrogating antennas (identified in Column 1).
  • Columns II and III define the type and reporting period, respectively, associated with each RFID tag, while Column IV identifies the total number of RFID tags disposed in each read field of the respective antenna.
  • Initial assumptions are made concerning the initial or baseline timeout setting in Column V and threshold time periods for each of the read fields in Column VI. Such assumptions are based on an anticipated number of ten (10) RFID tags in each read field and a threshold time period equivalent to about twice the reporting period. Accordingly, for ten (10) class 1 type RFID tags, the initial or baseline timeout setting is established at one-hundred and twenty milliseconds (120 ms), or 10 tags ⁇ 12 ms. Furthermore, inasmuch as a class 1 type RFID requires an average of twelve milliseconds (12 ms) to acquire and communicate within a read field, the threshold period is established at twenty-four milliseconds (24 ms), or 12 ms ⁇ 2 (twice the reporting period).
  • the variance is equal to zero (0) minus twenty-four milliseconds (24 ms) or a value of negative twenty-four milliseconds ( ⁇ 24 ms).
  • parentheses are used in the table to denote negative values.
  • a steady state condition S may be achieved and no further modification/change NC is effected during the next or subsequent interrogation cycle.
  • a range of tuning thresholds was established as being equal to the absolute value of the reporting period. Consequently, for a class 1 RFID tag, a range of between ⁇ twelve milliseconds ( ⁇ 12 ms) was chosen to effect a steady state condition. While such steady state condition may be deemed desirable, it should be appreciated that a steady state condition is not essential to the operation of the RFID system. That is, the system can be permitted to fluctuate with each interrogation cycle.
  • a complete or total interrogation cycle shown in Row No 9, Column V, equals the summation of all timeout settings or nine hundred and sixty milliseconds (960 ms).
  • the adaptive tuning algorithm optimizes the RFID system by minimizing the time required to perform a complete interrogation cycle (i.e., performing a query of all eight (8) antennas). Further, such optimization is performed while maintaining system reliability, i.e., communication with all RFID tags within the respective read fields.
  • ATVs Adaptive Tuning Values
  • the period differential and variance are sufficiently refined (i.e., within a window or range of values) such that the adaptive tuning values have reached steady state conditions.
  • the interrogation cycle time has been optimized by an additional one hundred and forty-four milliseconds (144 ms) to a value of five hundred and seventy-six milliseconds (576 ms). As such, the interrogation cycle time will remain this value (i.e., with all antennas having reached steady state conditions) until some movement of at least one RFID tag occurs.
  • the various method steps may be conducted by a processor having program code for controlling the reader.
  • a separate processor/controller may be disposed in communication with the reader for issuing the necessary commands or input signals to perform the various method steps including the various adaptive tuning algorithms described herein.
  • the initial timeout settings and/or threshold time periods may reside in program code and the program code may be integral with the reader/controller.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Finance (AREA)
  • Near-Field Transmission Systems (AREA)
  • Radar Systems Or Details Thereof (AREA)

Abstract

A method for adaptively controlling a Radio Frequency IDentification (RFID) system having a plurality of interrogating antennas and RFID tags. The method comprises the steps of establishing a timeout setting indicative of the time that each interrogating antenna powers a read field during a respective read period and a threshold time period indicative of the time required to transmit energy/exchange data between the RFID tag and the interrogating antenna. A period differential is then calculated which is indicative of the difference between the timeout setting and the time elapsed for the final RFID tag within a respective read field to communicate its RFID tag information. The timeout setting for each interrogating antenna may then be adaptively tuned or varied in accordance with the period differential. To expedite and/or refine the adaptive tuning feature, a variance may also be calculated indicative of the difference between the threshold time period and the period differential. The timeout setting may be decremented when the threshold time period is greater than the period differential and/or variance and incremented when the time period is less than the period differential and/or variance. Such variation of the timeout setting is evaluated with each interrogation cycle of the RFID system.

Description

RELATED APPLICATION
This patent application relates to commonly-owned, co-pending application Ser. No. 11/397,160 entitled “PERFORMANCE ENHANCEMENT ALGORITHM FOR RADIO FREQUENCY IDENTIFICATION (RFID) SYSTEMS”
FIELD OF THE INVENTION
The present invention relates to Radio Frequency IDentification (RFID) systems and, more particularly, to a new and useful control algorithm for an RFID which optimizes the accuracy, veracity and conclusions which may be drawn from the RFID system.
BACKGROUND OF THE INVENTION
Radio Frequency Identification (RFID) is a method of identifying unique devices, and information contained therein, using radio waves. Typically, a reader communicates with a tag/device which holds unique digital information in a microchip. The tag/device may employ select materials to reflect back a portion of the transmitted radio waves thereby providing an indication that the tag/device is within the field or zone of the interrogating reader.
RFID systems can be passive, active or semi-passive. A passive RFID system employs a passive tag/device having a receiving antenna which is sufficiently large, or selectively shaped/dimensioned, to capture (or harvest) energy from a surrounding electromagnetic field, i.e., the radio frequency energy, to power the passive tag/device. The receiving antenna is electrically connected to a central microchip which performs various preprogrammed RFID functions. An active RFID system employs an active tag/device having an energy source, e.g., an embedded battery, to power the active device and broadcast signals to the reader. Consequently, active RFID systems do not require an electromagnetic field to power the tag/device. A semi-passive system is similar to active systems in the sense that an energy source is employed to power a tag/device, however, the energy is used to activate or augment the microchip's processing capability rather than to broadcast signals back to the reader. The tags/device employed in semi-passive systems are also referred to as battery-assisted tags inasmuch as a portion of the energy is acquired from the tag while another portion is obtained from the read field of the antenna. As such, semi-passive tags increase the read range of the RFID system.
RFID systems operate in the Low, High and Ultra-High Frequency radio frequency bands or between the range of about 125 kHz (LF) to about 960 MHz (UHF). Generally, RFID devices operating in the LF bands are preferable for short ranges while those operating in the high or ultra-high frequency (HF or UHF) bands are preferable for longer ranges. RFID technology is continuously improving and, currently, readers can produce a field such that a device located therein can be energized and/or interrogated at distances of up to 1000 feet (especially when using powered/active tags).
Readers often employ multiplexers which utilize a plurality of antennas activated serially or in seriatim. More specifically, each of the antennas interrogates a field or zone for a certain period of time to ensure that all tags, i.e., anticipated to be located within the particular read field, have had sufficient time to harvest the RF energy and report its information back to the reader. For example, a reader having eight (8) antennas each interrogating a field for a period of about ten (10) seconds (i.e., to ensure that each tag/device within a specific read field has had ample opportunity to respond/report information) will require a total of eighty (80) seconds (1⅓ minutes) to complete one full interrogation cycle. Therefore, as the number of antennas increase to cover a larger territory, the time required to complete an interrogation cycle increases proportionally.
RFID systems facilitate tracking of various items (i.e., items which have an accompanying RFID tag/device) for the purpose of controlling merchandise, maintaining inventory levels, or simply monitoring the location and/or flow of important documents. Furthermore, inasmuch as RFID systems utilize time-stamping (typically measured from a common reference such as the EPOCH) to identify when a particular tag/device was identified by the reader, certain information can be ascertained and conclusions drawn from information reported.
For example, if eight (8) tagged items report their presence within one read field, and, following a subsequent interrogation cycle, six (6) tagged items report their original location/read field with the remaining two (2) tagged items reporting a location in an adjacent read field, then one may conclude that two (2) of the tagged items have moved from one location to another during the elapsed time period. If, on the other hand, four (4) tagged items moved from their original location/read field, but two (2) of the tagged items returned to their original location/read field within the time frame of an interrogation cycle, then the RFID system may incorrectly characterize the transfer or movement of all of the items. That is, two (2) of the tagged items may incorrectly be characterized as having been stationary, i.e., remaining in the original location, for the duration of the interrogation cycle—despite the fact that these two items moved and returned before the system could properly or correctly track such movement.
The example above, therefore, highlights the difficulties or inaccuracies caused by the time elapsed during an interrogation cycle. More specifically, it emphasizes the need for minimizing the time required for interrogation without compromising tag information or location data.
A need, therefore, exists for an RFID system which adaptively changes or controls the interrogation cycle to optimize the time required for accurate exchange of data between the tag/device and reader.
SUMMARY OF THE INVENTION
A method is provided for adaptively controlling a Radio Frequency IDentification (RFID) system having a plurality of interrogating antennas and RFID tags. The method comprises the steps of establishing a timeout setting indicative of the time that each interrogating antenna powers a read field during a respective read period and a threshold time period indicative of the time required to transmit energy/exchange data between the RFID tag and the interrogating antenna.
A period differential is then calculated which is indicative of the difference between the timeout setting and the time elapsed for the final RFID tag within a respective read field to communicate its RFID tag information. The timeout setting for each interrogating antenna may then be adaptively tuned or varied in accordance with the period differential. To expedite and/or refine the adaptive tuning feature, a variance may also be calculated indicative of the difference between the threshold time period and the period differential. The timeout setting may be decremented when the threshold time period is greater than the period differential and/or variance and incremented when the time period is less than the period differential and/or variance. Such variation of the timeout setting is evaluated with each interrogation cycle of the RFID system.
BRIEF DESCRIPTION OF THE DRAWINGS
Reference is now made to the various figures wherein like reference numerals designate similar items in the various figures and in which:
FIG. 1 is a schematic block diagram of a Radio Frequency IDentification (RFID) system having a plurality of antennas which collaboratively establish respective read fields for interrogating the presence and/or location of RFID tags/devices.
FIG. 2 is a flow diagram of a method for enhancing the performance of an RFID system by adaptively tuning the RFID system.
FIG. 3 a shows RFID tag information in tabular format indicative of various settings and values of an RFID system according to the present invention while the system performs an initial interrogation cycle.
FIG. 3 b shows the RFID tag information indicative of the settings and values of the RFID system following a subsequent interrogation cycle.
FIG. 3 c shows the RFID tag information and the effects of adaptive tuning on the RFID system following a third interrogation cycle and upon reaching a steady state condition.
DETAILED DESCRIPTION OF THE INVENTION
The present invention is described in the context of a Radio Frequency Identification (RFID) system having a plurality of antennas communicating with a single RFID reader. Each antenna produces a respective read field within an area of interest, i.e., an office space or inventory stock room, and interrogate/communicate with various RFID tags/devices which may be disposed within the respective read field. The read fields produced may be circular or linear polarized (i.e., directional) antennas depending upon the configuration or region of interest, e.g., a square office area, rectangular isle, etc. Furthermore, the read fields will generally be configured to span or provide coverage for the entire area to ensure that all RFID tags/devices within the area receive or harvest sufficient energy to communicate with the antenna/reader. In another embodiment of the invention, described in greater detail hereinafter, the RFID system is dynamically tuned to improve the energy harvested by an RFID tag/device should a tag/device be located along a fringe area or condition of a respective read field.
In the described embodiment, and referring to FIG. 1, the RFID system 10 employs eight (8) RF antennas 12 each disposed within an office area 14 and produces a substantially circular read field 16. The antennas 12 are electrically connected to a central reader 18 which is capable of supplying or transmitting RF energy to the antennas in addition to receiving and processing digital information therefrom. More specifically, the reader 18 is preprogrammed to sequentially power each antenna for a specific period of time, typically referred to as the “timeout setting”. The timeout setting may also be viewed as the period of time that the interrogating antenna transmits RF energy within a respective read field 16 to power, energize or activate RFID tags/devices 20 which may be located or disposed within the read field 16.
The reader 18 will also include an anti-collision algorithm to prevent the various tag/devices from simultaneously transmitting feedback signals to or communicating with the reader at the same time. That is, the anti-collision algorithm causes the various tags/devices to stagger the tag feedback to prevent the signals from “colliding” or interfering with each other. Inasmuch as such anti-collision algorithms are well known in art of RFID systems, no further discussion of its operation is provided or warranted for implementing the teachings of the present invention.
In FIG. 2, a method for adaptively tuning the RFID system is provided to optimize the interrogation cycle within each of the respective antenna read fields. In a first step A of the method, a baseline or initial timeout setting is established which is indicative of the time that each interrogating antenna powers a read field during a respective read period. Generally, the timeout setting will be determined based upon the number of RFID tags/devices which are anticipated to be located within a specific read field, and upon the type or “Class” of RFID tag employed in the system. With respect to the latter, RFID tags/devices are rated in various classes depending upon the type or complexity of the functions performed by the RFID tag.
For example, the most elementary or fundamental RFID tag (e.g., a Class 0 tag) may be one which is a passive device having the sole function of reporting a serial number to an interrogating antenna. As such, RFID tags of this type require a short time period or “reporting period” to perform such function, i.e., on the order of three milliseconds (3 ms). RFID tags which are more complex (e.g., Class 1 tags) may include active RFID devices which may report location and identification information to the interrogating antenna. Accordingly, RFID tags of this type may require a longer reporting period, i.e., on the order of twelve milliseconds (12 ms). Higher class tags may incorporate additional functionality such as cross-communication with other tags within the same or adjacent read fields. As such, even longer reporting periods or response times may be required when employing RFID tags having increased sophistication or complexity.
In step B, a threshold time period is established for the purpose of defining when, and by what amount or degree, the RFID system requires adaptive tuning. The threshold time period may be based upon the reporting period, or the time typically necessary, to acquire the RF energy and communicate RFID tag information to the respective interrogating antenna. While the threshold time period will, at minimum, be based upon the class of RFID tag employed in a particular system, the threshold time period will generally be the product of the reporting period and a factor/coefficient or percentage of the reporting period. For example, the threshold time period may be equal to a value X equal to one-hundred and fifty percent (150%) of the reporting period. Alternatively, the value X may be an even multiple of the reporting period, e.g., twice or 200% thereof. The rationale for establishing the magnitude of the threshold time period will come into greater focus when discussing the steps for adaptively tuning the timeout setting with each interrogation cycle of the RFID system.
In step C, a period differential is calculated between the timeout setting and an elapsed time for a final RFID tag within the respective read field to communicate its RFID tag information. More specifically, this method step C determines the time differential between the last RFID tag to report and the end of the timeout setting. For example, if the timeout setting of a particular antenna is set to one-hundred and twenty milliseconds (120 ms) and three (3) Class 1 RFID tags report information within an elapsed time of thirty-six milliseconds (36 ms) within a respective read field, then the period differential is the difference therebetween or eighty-four milliseconds (84 ms).
In step D, a variance is calculated as the difference between the period differential and the threshold time period. As suggested above, a threshold time period may be established in step B above as being a multiple of the reporting period. If the reporting period for a class 1 RFID tag is twelve milliseconds (12 ms), then the threshold time period may be established at, for example, twice the reporting period or twenty-four milliseconds (24 ms). Using the values discussed above, the variance is calculated to be sixty milliseconds (60 ms) or twenty four milliseconds (24 ms) subtracted from eighty-four milliseconds (84 ms).
In steps E and F, the timeout setting of each interrogating antenna may be adaptively varied in accordance with the respective variance. That is, with each interrogation cycle, the timeout setting for each antenna may be incremented or decremented to optimize the interrogation time of the overall RFID system. For example, should a timeout setting have been established at a substantially higher value than the elapsed time required for reporting, i.e., the reporting period, then greater efficiencies may be achieved by reducing the timeout setting during the next or subsequent interrogation cycles. On the other hand, should a greater number of RFID tags be present and reporting in a particular read field, i.e., such that all of the RFID tags may not have reported or communicated with the interrogating antenna, then it may be desirable to expand the timeout setting. As such, by incrementing the timeout setting with each subsequent interrogation cycle, i.e., such that the timeout setting is stabilized from one cycle to the next, then the system can confidently read all of the RFID tags.
It should also be appreciated that the timeout setting may be varied directly from information obtained from the period differential, however, for more refined tuning a comparison is made using the variance, i.e., the difference between the threshold value and the period differential. For example, it may be appropriate to decrement the timeout setting if the period differential is greater than some percentage of the timeout setting. That is, if the period differential is calculated to be fifty percent (50%) of the timeout setting, then one can conclude that the timeout setting is larger than necessary. Consequently, it may be appropriate to decrement the timeout setting by twenty-five percent (25%), or fifty percent (50%) of the period differential, during the next or subsequent interrogation cycle.
To better illustrate the adaptive tuning feature of the present invention, reference is made to FIGS. 3 a-3 c which illustrate, in tabular form, the established and calculated values described in the inventive method. Each table corresponds to one interrogation cycle of the RFID system and all of the tables sequentially span three interrogation cycles, i.e., at times T=0, T=1, and T=2. Each of the tables comprises eight rows consistent with the total number of interrogating antennas (identified in Column 1). Columns II and III define the type and reporting period, respectively, associated with each RFID tag, while Column IV identifies the total number of RFID tags disposed in each read field of the respective antenna.
Initial assumptions are made concerning the initial or baseline timeout setting in Column V and threshold time periods for each of the read fields in Column VI. Such assumptions are based on an anticipated number of ten (10) RFID tags in each read field and a threshold time period equivalent to about twice the reporting period. Accordingly, for ten (10) class 1 type RFID tags, the initial or baseline timeout setting is established at one-hundred and twenty milliseconds (120 ms), or 10 tags×12 ms. Furthermore, inasmuch as a class 1 type RFID requires an average of twelve milliseconds (12 ms) to acquire and communicate within a read field, the threshold period is established at twenty-four milliseconds (24 ms), or 12 ms×2 (twice the reporting period).
At time T=0, or during the first interrogation cycle, ten (10) of the twelve (12) total RFID tags (see Column VII) are capable of responding within the established timeout setting of one-hundred and twenty milliseconds (120 ms). Hence, on an imaginary timeline, the time elapsed from the beginning of the RF interrogation pulse to the time that the last RFID tag responds, i.e., the value shown in column VIII, corresponds to the one-hundred and twenty millisecond (120 ms) mark on the imaginary timeline. During activation of the read field produced by antenna # 1, therefore, adequate time was not available for all of the RFID tags to report. That is, at least two (2) RFID tags have not reported or communicated with interrogating antenna No. 1. Inasmuch as, in the example provided, the magnitude of the timeout setting is exactly equal to the time elapsed for the last RFID tag to respond, the period differential, identified in Column IX is equal to zero (0). That is, the timeout setting (Column V) minus the time elapsed (Column XIII)=one hundred twenty milliseconds (120 ms) minus one hundred twenty milliseconds (120 ms) for ten (10) of the twelve (12) RFID tags to report on the imaginary timeline. Furthermore, as discussed earlier, the variance, seen in Column X, is equal to the difference between the period differential and the threshold time period. Accordingly, the variance is equal to zero (0) minus twenty-four milliseconds (24 ms) or a value of negative twenty-four milliseconds (−24 ms). In accordance with conventional accounting or spreadsheet practices, parentheses are used in the table to denote negative values.
In Columns XI and XII, the percentage and values for modifying or adaptively tuning the timeout setting for subsequent interrogation cycles are shown. These values modify the data associated with the subsequent interrogation cycles at T=1 and T=2, shown in FIGS. 3 b and 3 c, respectively. In the described embodiment, the variance is incremented by two-hundred percent (200%) and decremented by fifty percent (50%) to yield the adaptive tuning values shown in Column XII. Although, it may be desirable to vary the magnitude of the multiplier or quotient to depending upon the magnitude of the period differential or variance to more rapidly approach optimal tuning values.
If the adaptive tuning value, e.g., after incrementing or decrementing the variance, is less than a tuning threshold then a steady state condition S may be achieved and no further modification/change NC is effected during the next or subsequent interrogation cycle. For the purposes of setting forth an example in the Tables of FIGS. 3 a-3 c, a range of tuning thresholds was established as being equal to the absolute value of the reporting period. Consequently, for a class 1 RFID tag, a range of between ±twelve milliseconds (±12 ms) was chosen to effect a steady state condition. While such steady state condition may be deemed desirable, it should be appreciated that a steady state condition is not essential to the operation of the RFID system. That is, the system can be permitted to fluctuate with each interrogation cycle.
Before moving on to a discussion of the subsequent tables, it should be appreciated that a complete or total interrogation cycle, shown in Row No 9, Column V, equals the summation of all timeout settings or nine hundred and sixty milliseconds (960 ms). In the subsequent paragraphs, it will be understood that the adaptive tuning algorithm optimizes the RFID system by minimizing the time required to perform a complete interrogation cycle (i.e., performing a query of all eight (8) antennas). Further, such optimization is performed while maintaining system reliability, i.e., communication with all RFID tags within the respective read fields.
Referring now to FIG. 3 b, the timeout settings (T=1 shown in Column V) for each of the interrogating antennas Nos. 1-8 have been varied, i.e., incremented or decremented, by the Adaptive Tuning Values (ATVs) identified in, Column XII of FIG. 3 a. More specifically, upon incrementing the timeout setting to one-hundred and sixty-eight milliseconds (168 ms) in connection with antenna No. 1, all RFID tags are now able to report or communicate with the reader with time remaining i.e., a period differential of twenty-two (24 ms) in Column IX. Inasmuch as the variance between the threshold time period of twenty-four is zero (0) and the adaptive tuning value after variance is less than the reporting period of twelve (12 ms), it may be concluded that a steady state condition S (see Column XI) has been achieved during this interrogation cycle and no change NC is required with respect to the adaptive tuning value. An examination of the table reveals that the adaptive tuning values are more refined, i.e., approaching steady state conditions, and that the total interrogation cycle time has decreased by two hundred and forty milliseconds (240 ms) to a value of seven hundred and twenty milliseconds (720 ms).
In FIG. 3 c, the same analysis proceeds with the timeout settings (T=2 in Column V) being varied by the adaptive tuning values defined in the prior table (FIG. 3 b, Column XII). Inasmuch as the comparisons and calculations are the same as those previously discussed, it is suffice to say that the period differential and variance are sufficiently refined (i.e., within a window or range of values) such that the adaptive tuning values have reached steady state conditions. Furthermore, the interrogation cycle time has been optimized by an additional one hundred and forty-four milliseconds (144 ms) to a value of five hundred and seventy-six milliseconds (576 ms). As such, the interrogation cycle time will remain this value (i.e., with all antennas having reached steady state conditions) until some movement of at least one RFID tag occurs.
While the present invention has been described in the context of a method for operating an RFID system, it will be readily apparent that the various method steps may be conducted by a processor having program code for controlling the reader. Alternatively, a separate processor/controller may be disposed in communication with the reader for issuing the necessary commands or input signals to perform the various method steps including the various adaptive tuning algorithms described herein. Accordingly, the initial timeout settings and/or threshold time periods may reside in program code and the program code may be integral with the reader/controller.
Although the invention has been described with respect to a preferred embodiment thereof, it will be understood by those skilled in the art that the foregoing and various other changes, omissions and deviations in the form and detail thereof may be made without departing from the scope of this invention.

Claims (20)

1. A method for adaptively controlling a Radio Frequency IDentification (RFID) system having a plurality of interrogating antennas and RFID tags, the interrogating antennas transmitting RF energy within a read field; the method comprising the steps of:
establishing a timeout setting indicative of the time that each interrogating antenna powers a read field during a respective read period;
calculating a period differential indicative of the difference between the timeout setting and an elapsed time for a final RFID tag within a respective read field to communicate its RFID tag information; and
varying the timeout setting of each interrogating antenna in accordance with the respective period differential.
2. The method according to claim 1 further comprising the steps of:
establishing a threshold time period X indicative of a reporting period to acquire the RF energy and communicate RFID tag information to the respective interrogating antenna;
determining a variance indicative of the difference between the threshold time period X and the period differential, and
varying the timeout setting of each interrogating antenna based upon the magnitude of the variance.
3. The method according to claim 2 wherein the threshold time period X is based on a number of RFID tags anticipated to be located within the respective read field.
4. The method according to claim 2 wherein the threshold time period X is a percentage of the time required for an RFID to exchange information between the RFID tag and an interrogating antenna.
5. The method according to claim 2 wherein the threshold time period X is a percentage equal to at least 150% of the reporting time period.
6. The method according to claim 2 wherein the threshold time period X is a percentage equal to at least 200% of the reporting time period.
7. The method according to claim 2 wherein the step of varying the timeout setting further comprises the step of decrementing the timeout setting by a first value when the period differential exceeds the threshold time period.
8. The method according to claim 7 wherein the first value is about 50% of the variance.
9. The method according to claim 2 wherein the step of varying the timeout setting further comprises the step of incrementing the timeout setting by a second value when the period differential is less than the threshold time period.
10. The method according to claim 9 wherein the second value is about 200% of the variance.
11. The method according to claim 2 wherein the RFID system sequentially interrogates each read field by serially querying the RFID antennas within an interrogation cycle, and further comprising the step of varying the timeout setting of each interrogating antenna by an adaptive tuning value with each interrogation cycle.
12. An RFID system comprising:
a reader including a timeout setting indicative of the time that each interrogating antenna powers a read field during a respective read period;
at least one interrogating antenna in communication with the reader and operative to transmit RF energy within a read field during an interrogation cycle,
a plurality of RFID tags disposed within the read field communicating with the antenna; and
a processor including program code operative to control the reader and calculate a period differential indicative of the difference between the timeout setting and an elapsed time for a final RFID tag within a respective read field to communicate its RFID tag information and
vary the timeout setting of each interrogating antenna in accordance with the respective period differential.
13. The RFID system according to claim 12 wherein the program code includes a threshold time period X indicative of a reporting period to acquire the RF energy and communicate RFID tag information to the respective interrogating antenna, the controller, furthermore, operative to determine a variance indicative of the difference between the threshold time period X and the period differential and vary the timeout setting of each interrogating antenna based upon the magnitude of the variance.
14. The RFID system according to claim 13 wherein the RFID system sequentially interrogates each read field by serially querying the RFID antennas within an interrogation cycle, and further comprising the step of varying the timeout setting of each interrogating antenna by an adaptive tuning value with each interrogation cycle.
15. The RFID system according to claim 13 wherein the threshold time period X is based on a number of RFID tags anticipated to be located within the respective read field.
16. The RFID system according to claim 13 wherein the threshold time period X is a percentage of the time required for an RFID to exchange information between the RFID tag and an interrogating antenna.
17. The RFID system according to claim 13 wherein the processor is operative to decrement the timeout setting by a first value when the period differential exceeds the threshold time period.
18. The RFID system according to claim 17 wherein the first value is about 50% of the variance.
19. The RFID system according to claim 13 wherein the processor is operative to increment the timeout setting by a second value when the period differential is less than the threshold time period.
20. The RFID system according to claim 19 wherein the second value is about 200% of the variance.
US11/397,244 2006-04-04 2006-04-04 Adaptive radio frequency identification control algorithm Expired - Fee Related US7561044B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/397,244 US7561044B2 (en) 2006-04-04 2006-04-04 Adaptive radio frequency identification control algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11/397,244 US7561044B2 (en) 2006-04-04 2006-04-04 Adaptive radio frequency identification control algorithm

Publications (2)

Publication Number Publication Date
US20070229260A1 US20070229260A1 (en) 2007-10-04
US7561044B2 true US7561044B2 (en) 2009-07-14

Family

ID=38558010

Family Applications (1)

Application Number Title Priority Date Filing Date
US11/397,244 Expired - Fee Related US7561044B2 (en) 2006-04-04 2006-04-04 Adaptive radio frequency identification control algorithm

Country Status (1)

Country Link
US (1) US7561044B2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120206241A1 (en) * 2007-12-05 2012-08-16 Christopher Rice Gateway radio frequency identification tag system

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007087032A (en) * 2005-09-21 2007-04-05 Toshiba Tec Corp Wireless tag reader
NL1033982C2 (en) * 2007-06-13 2008-12-16 Nedap Nv System for recognizing animals.
US8508336B2 (en) * 2008-02-14 2013-08-13 Proxense, Llc Proximity-based healthcare management system with automatic access to private information
NL2011749C2 (en) * 2013-11-07 2015-05-11 Nedap Nv SYSTEM FOR DETECTING THE PRESENCE OF ANIMALS, IN PARTICULAR ALSO THE IDENTITY OF THE ANIMAL IN A MULTIPLE OF SUB-AREAS.

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010040513A1 (en) * 1999-05-24 2001-11-15 Mcdonald Glenn Method and apparatus for tracking and locating a moveable article
US7053777B2 (en) * 1998-10-26 2006-05-30 Identec Solutions Inc. Interrogation, monitoring and data exchange using RFID tags
US20060158313A1 (en) * 2005-01-19 2006-07-20 Nec Corporation RFID reading system, RFID reading method, RFID reader, RFID read controlling apparatus, RFID reader control program, computer-readable information recording medium having recorded the same, control program for RFID read control apparatus, and computer-readable information recording medium having recorded the same
US20060170565A1 (en) * 2004-07-30 2006-08-03 Husak David J Location virtualization in an RFID system
US7119692B2 (en) * 2003-11-10 2006-10-10 3M Innovative Properties Company System for detecting radio-frequency identification tags
US20070200712A1 (en) * 2006-02-28 2007-08-30 Symbol Technologies, Inc. Smart RFID reader antennas
US7372364B2 (en) * 2003-11-10 2008-05-13 3M Innovative Properties Company Algorithm for RFID security
US7394358B2 (en) * 2005-09-19 2008-07-01 Datalogic Scanning, Inc. Method and system for inventory monitoring

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7053777B2 (en) * 1998-10-26 2006-05-30 Identec Solutions Inc. Interrogation, monitoring and data exchange using RFID tags
US20010040513A1 (en) * 1999-05-24 2001-11-15 Mcdonald Glenn Method and apparatus for tracking and locating a moveable article
US7119692B2 (en) * 2003-11-10 2006-10-10 3M Innovative Properties Company System for detecting radio-frequency identification tags
US20070075836A1 (en) * 2003-11-10 2007-04-05 3M Innovative Properties Company System for detecting radio-frequency identification tags
US7372364B2 (en) * 2003-11-10 2008-05-13 3M Innovative Properties Company Algorithm for RFID security
US20060170565A1 (en) * 2004-07-30 2006-08-03 Husak David J Location virtualization in an RFID system
US20060158313A1 (en) * 2005-01-19 2006-07-20 Nec Corporation RFID reading system, RFID reading method, RFID reader, RFID read controlling apparatus, RFID reader control program, computer-readable information recording medium having recorded the same, control program for RFID read control apparatus, and computer-readable information recording medium having recorded the same
US7394358B2 (en) * 2005-09-19 2008-07-01 Datalogic Scanning, Inc. Method and system for inventory monitoring
US20070200712A1 (en) * 2006-02-28 2007-08-30 Symbol Technologies, Inc. Smart RFID reader antennas

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120206241A1 (en) * 2007-12-05 2012-08-16 Christopher Rice Gateway radio frequency identification tag system
US8581729B2 (en) * 2007-12-05 2013-11-12 At&T Intellectual Property Ii, L.P. Gateway radio frequency identification tag system

Also Published As

Publication number Publication date
US20070229260A1 (en) 2007-10-04

Similar Documents

Publication Publication Date Title
US7548165B2 (en) Performance enhancement algorithm for radio frequency identification (RFID) systems
US9754143B2 (en) Radio frequency identification readers, methods and computer program products for adjusting a query command slot-counter parameter Q
US7561044B2 (en) Adaptive radio frequency identification control algorithm
KR100717877B1 (en) Tag Number Estimation Method in Sloted Aloha based RFID Systems
Li et al. Energy efficient algorithms for the RFID estimation problem
EP1708375B1 (en) Ic tag location recognition device and method
EP2377067B1 (en) Inclusive or exclusive rfid tag interrogation and query round
US10141982B2 (en) RFID protocols with non-interacting variants
EP1717726B1 (en) Radio frequency identification reader, radio frequency identification tag, and method for identifying RFID tags
US20150278565A1 (en) System for and method of rapidly determining true bearings of radio frequency identification (rfid) tags associated with items in a controlled area
US9317725B1 (en) RFID protocol
US20100079252A1 (en) Apparatus for communicating with RFID tag and method for communicating with RFID tag
CN101359358A (en) Label recognizing system, label accessing device and label sposition determining method
Fabbri et al. Long range battery-less UHF-RFID platform for sensor applications
Arjona et al. Timing-aware RFID anti-collision protocol to increase the tag identification rate
Alesii et al. Multi-reader multi-tag architecture for UWB/UHF radio frequency identification systems
Sahoo et al. Improving rfid system to read tags efficiently
Azambuja et al. Survey of standardized ISO 18000-6 RFID anti-collision protocols
GB2581748A (en) Systems and methods for density-based RFID network configuration
US20060082442A1 (en) Preambles with relatively unambiguous autocorrelation peak in RFID systems
CN107966680B (en) Array type space-time multi-dimensional division positioning system and method
Wang et al. Design of RFID reader using multi-antenna with difference spatial location
Mokhtari et al. Using capture effect in DFSA anti-collision protocol in RFID systems according to ISO18000-6C standard
Egea-Lopez et al. On the implementation of a multi-reader radio frequency identification (RFID) architecture
Šolić et al. RFID reader-tag communication throughput analysis using Gen2 Q-algorithm frame adaptation scheme

Legal Events

Date Code Title Description
AS Assignment

Owner name: PITNEY BOWES INC., CONNECTICUT

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BRAUN, JOHN F.;COFFY, JEAN-HIRAM;PARKOS, ARTHUR J.;AND OTHERS;REEL/FRAME:017770/0502;SIGNING DATES FROM 20060403 TO 20060404

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

FPAY Fee payment

Year of fee payment: 8

AS Assignment

Owner name: JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT

Free format text: SECURITY INTEREST;ASSIGNORS:PITNEY BOWES INC.;NEWGISTICS, INC.;BORDERFREE, INC.;AND OTHERS;REEL/FRAME:050905/0640

Effective date: 20191101

Owner name: JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT, NEW YORK

Free format text: SECURITY INTEREST;ASSIGNORS:PITNEY BOWES INC.;NEWGISTICS, INC.;BORDERFREE, INC.;AND OTHERS;REEL/FRAME:050905/0640

Effective date: 20191101

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20210714